Akamai Diversity

The Akamai Blog

Jim Black

Jim Black

October 28, 2019 2:00 PM

Firefox DNS over HTTPS (DoH) and Enterprise Threat P ...

Recursive DNS communications are normally unencrypted between a client and a resolver. In an effort to improve user privacy and address security concerns, Mozilla announced it would begin enabling DNS over HTTPS (DoH) by default in its Firefox browser. However, Mozilla recognized it would be necessary in some cases for enterprises to be able to inspect DNS traffic to enforce security controls. Consequently, Firefox also supports a "Network Signal" that,

Luis Raga Hines

Luis Raga Hines

October 14, 2019 11:00 AM

Phishing Tool Analysis: Modlishka

Additional research and support provided by Danny Wasserman. Overview One of the goals of phishing sites is to lure individuals into providing sensitive data, such as personally identifiable information, banking and credit card details, and passwords, through the use of email, SMS, social media, and messaging apps. This information is then used to access important accounts and can result in identity theft and financial loss.

Jim Black

Jim Black

October 11, 2019 3:00 PM

Real-Time Phishing Protections

In my previous blogs, I wrote about how phishing is no longer just an email problem, how the industrialization of phishing is being driven by the easy availability and low cost of phishing toolkits, and how current phishing defenses are being bypassed by attackers.

Jim Black

Jim Black

October 2, 2019 12:50 PM

But We Have an Email Gateway...

In my previous phishing blogs, I wrote about the evolution of phishing and the industrialization of phishing that's being driven by the availability and low cost of toolkits.

Jim Black

Jim Black

September 26, 2019 11:00 AM

The Phishing Industry

As I mentioned in my previous blog post, phishing attacks are now being created and executed on an industrial scale. Malicious actors are increasingly using highly sophisticated off-the-shelf phishing kits that allow them to deliver very targeted, short-lived attacks. These campaigns direct victims to a phishing web page that's an exact copy of a consumer or enterprise brand's site. This has lowered the barrier to entry for launching phishing attacks.

Jim Black

Jim Black

September 18, 2019 3:30 PM

This Isn't the Phishing Your First Boss Knew

Phishing has been around for nearly as long as email has, and the perception that phishing tactics have not evolved persists. Many people believe we are still in the era of the easy-to-spot "Nigerian prince" emails, shown below. Underneath that, we see a highly creative, yet not any more technically sophisticated, "Nigerian astronaut" ruse.

Maria Ramirez

Maria Ramirez

September 5, 2019 11:00 AM

DNS Protection: A "Must" in Security Solutions for a ...

Domain name system (DNS) services are often a point of vulnerability for businesses, so DNS security has become a growing concern for many of them.

Lorenz Jakober

Lorenz Jakober

August 7, 2019 11:30 AM

Trust As The Foundation Of Security

Our customers are moving more workloads to the cloud. No surprise there. The siren song of agility, scale, and cost savings can't be resisted. But as we highlighted earlier, security fundamentals are key to a successful cloud migration. In fact, we also shared marketectures to successfully migrate apps to the cloud and the top best practices for securing cloud workloads. While there are plenty of areas to dive into across

Jim Black

Jim Black

March 22, 2019 9:00 AM

Securing Your Direct Internet Access Connections

With the rapid uptake in SaaS applications and the ease of moving enterprise applications from the data center to the cloud, many global companies are transforming the way they connect branch offices. In the past, the conventional approach was to connect all of your locations over an MPLS Wide Area Network (WAN) and then send all branch traffic over that to a regional HQ or even a single global HQ.